|
|
|
Yuan Gao, Guoliang Yu and Min Gao
When the adaptive filter length is increased, the calculation complexity increases rapidly because the relationship between the calculation and the adaptive filter length N contains a power function with no secondary path identification algorithm. Under ...
ver más
|
|
|
|
|
|
|
Sorin Zoican, Roxana Zoican, Dan Galatchi and Marius Vochin
This paper illustrates a general framework in which a neural network application can be easily integrated and proposes a traffic forecasting approach that uses neural networks based on graphs. Neural networks based on graphs have the advantage of capturi...
ver más
|
|
|
|
|
|
|
Li Li and Kyung Soo Jun
River flood routing computes changes in the shape of a flood wave over time as it travels downstream along a river. Conventional flood routing models, especially hydrodynamic models, require a high quality and quantity of input data, such as measured hyd...
ver más
|
|
|
|
|
|
|
Alan Huang and Justie Su-Tzu Juan
A personal camera fingerprint can be created from images in social media by using Photo Response Non-Uniformity (PRNU) noise, which is used to identify whether an unknown picture belongs to them. Social media has become ubiquitous in recent years and man...
ver más
|
|
|
|
|
|
|
Zhuo Li, Hengyi Li and Lin Meng
Currently, with the rapid development of deep learning, deep neural networks (DNNs) have been widely applied in various computer vision tasks. However, in the pursuit of performance, advanced DNN models have become more complex, which has led to a large ...
ver más
|
|
|
|
|
|
|
Ugochukwu Onyekachi Obonna, Felix Kelechi Opara, Christian Chidiebere Mbaocha, Jude-Kennedy Chibuzo Obichere, Isdore Onyema Akwukwaegbu, Miriam Mmesoma Amaefule and Cosmas Ifeanyi Nwakanma
Recently, the process control network (PCN) of oil and gas installation has been subjected to amorphous cyber-attacks. Examples include the denial-of-service (DoS), distributed denial-of-service (DDoS), and man-in-the-middle (MitM) attacks, and this may ...
ver más
|
|
|
|
|
|
|
Khaled A. Alaghbari, Heng-Siong Lim, Mohamad Hanif Md Saad and Yik Seng Yong
The intrusion detection system (IDS) is a promising technology for ensuring security against cyber-attacks in internet-of-things networks. In conventional IDS, anomaly detection and feature extraction are performed by two different models. In this paper,...
ver más
|
|
|
|
|
|
|
Weiguang Zheng, Quanfu Geng, Xiaohong Xu and Zhixiang Liu
The permanent-magnet synchronous motor (PMSM), with the advantages of low energy consumption and stable operation, is considered a green power source to replace gasoline engines. Motor control is the core problem of the electric-drive system, so it is im...
ver más
|
|
|
|
|
|
|
Bo Gao, Baowang Lian and Chengkai Tang
Traditional Micro-Aerial Vehicles (MAVs) are usually equipped with a low-cost Inertial Measurement Unit (IMU) and monocular cameras, how to achieve high precision and high reliability navigation under the framework of low computational complexity is the ...
ver más
|
|
|
|
|
|
|
Dominik Piatkowski and Krzysztof Walkowiak
As the COVID-19 pandemic emerged, everyone?s attention was brought to the topic of the health and safety of the entire human population. It has been proven that wearing a face mask can help limit the spread of the virus. Despite the enormous efforts of p...
ver más
|
|
|
|